In the Linux kernel, the following vulnerability has been resolved: s390/syscalls: Add spectre boundary for syscall dispatch table The s390 syscall number is directly controlled by userspace, but does not have an array_index_nospec() boundary to prevent access past the syscall function pointer tables.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2026042259-CVE-2026-31483-9bc8@gregkh/T